2PALANIAPPAN S, RABIAH A, MARIANA Y. A conceptual framework of info structure for information security risk assessment (ISRA)[J]. Journal of Information Security and Applications, 2013, 18: 45-52.
3REBOLLO O, MELLADO D, FERNANDEZ-MEDINA E, et al. Empirical evaluation of a cloud computing informationsecurity governance framework [J]. Information and Software Technology, 2015, 58 44-57.
4JIRASEK V. Practical application of information security models [J]. Information Security Technical Report, 2011, 17(1) : 1 8.
5WANG Dong, LI Ruixue, WANG Huaiyu, et al. Research on the model of in-depth defense and control ability system of information security[C]//2014 the 7th International Conference on Information Management, Innovation Management and Industrial Engineering, October 25-26, 2014, Xi'an, China: 153-155.